Advertisement
Guest User

cisco4

a guest
May 14th, 2011
1,938
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 86.59 KB | None | 0 0
  1. 1
  2. Bottom-up troubleshooting begins at which layer of the OSI model?
  3. network layer
  4. #physical layer
  5. data link layer
  6. transport layer
  7. application layer
  8.  
  9. 2
  10. Which two statements are true about local applications? (Choose two.)
  11. They run on the network.
  12. An example of a local application is e-mail.
  13. #They are accessed from a remote computer.
  14. They are stored on the local hard disk.
  15. #They run on the computer where they are installed.
  16.  
  17. 3
  18.  
  19.  
  20. Refer to the exhibit. What default gateway address will be assigned to PC1 if access to remote resources is needed?
  21. #192.31.7.3
  22. 192.168.1.101
  23. 192.168.1.253
  24. A default gateway is not necessary.
  25.  
  26. 4
  27. Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
  28. DNS server
  29. MAC address
  30. #default gateway
  31. operating system
  32. wireless equipment vendor
  33.  
  34. 5
  35. How do ISPs obtain public IP addresses?
  36. They create the addresses themselves.
  37. They obtain the addresses from the home PCs.
  38. They obtain the addresses from the Internet registry.
  39. #They obtain the addresses from the RFC.
  40.  
  41. 6
  42.  
  43.  
  44. Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
  45. acceptable use
  46. incident handling
  47. network maintenance
  48. #remote access
  49.  
  50. 7
  51. Which wireless component allows wireless clients to gain access to a wired network?
  52. PDA
  53. STA
  54. access point
  55. #wireless bridge
  56.  
  57. 8
  58. Which network design layer provides a connection point for end user devices to the network?
  59. access
  60. core
  61. distribution
  62. #network
  63.  
  64. 9
  65. Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
  66. DHCP
  67. FTP
  68. SMTP
  69. #TCP
  70. #UDP
  71.  
  72. 10
  73. An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
  74. DHCP
  75. #DNS
  76. FTP
  77. NAT
  78.  
  79. 11
  80.  
  81.  
  82. Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
  83. #The wireless connection is good.
  84. The WEP key or SSID needs to be checked.
  85. The DHCP configuration on the router needs to be checked.
  86. The wireless NIC driver or the NIC itself needs to be reinstalled.
  87.  
  88. 12
  89. A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
  90. Place the web server in a DMZ.
  91. #Keep the web server on the external network.
  92. Configure a firewall device to serve as the web server.
  93. Locate the web server in the server farm of the internal network.
  94.  
  95. 13
  96. TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:
  97.  
  98. A. The TCP header is removed.
  99. B. Bits are decoded and the destination MAC address is recognized.
  100. C. The IP header is removed and the contents are passed to the next layer.
  101. D. The Ethernet header and trailer are removed.
  102.  
  103. What is the correct sequence of these steps?
  104. A, B, C, D
  105. A, C, B, D
  106. #B, C, D, A
  107. B, D, C, A
  108. C, A, B, D
  109.  
  110. 14
  111. A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
  112. #broadcast
  113. simulcast
  114. multicast
  115. unicast
  116.  
  117. 15
  118. What are two ways that a user can interact with an operating system shell? (Choose two.)
  119. #CLI
  120. OS
  121. #GUI
  122. NIC
  123. kernel
  124.  
  125. 16
  126. What are two examples of peripheral input devices? (Choose two.)
  127. external modem
  128. #barcode reader
  129. #digital camera
  130. plotter
  131. printer
  132.  
  133. 17
  134. What are three examples of logical configuration information used when planning a network implementation? (Choose three.)
  135. #size of broadcast domains
  136. naming scheme
  137. length of cable runs
  138. #IP addressing scheme
  139. #physical device location
  140. location of power outlets
  141.  
  142. 18
  143. Which wireless protocol is used for encryption?
  144. EAP
  145. Open
  146. PSK
  147. #WEP
  148.  
  149. 19
  150. Which value represents the host portion of IP address 128.107.10.11 with a subnet mask of 255.255.0.0?
  151. .10
  152. #.10.11
  153. 128.107
  154. .107.10.11
  155. 128.107.10
  156.  
  157. 20
  158. A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
  159. #DSL
  160. dial-up
  161. satellite
  162. cell modem
  163. cable modem
  164.  
  165. 21
  166. What is the purpose of pop-up blocker software?
  167. It detects and removes spyware.
  168. It detects and removes viruses.
  169. #It prevents the display of advertisement windows.
  170. It removes unwanted e-mail.
  171.  
  172. 22
  173. What are two advantages of purchasing a custom-built computer? (Choose two.)
  174. usually a lower cost
  175. no waiting period for assembly
  176. #user can specify higher performance components
  177. #supports higher-end graphics and gaming applications
  178. fewer components to replace
  179.  
  180. 23
  181.  
  182.  
  183. Refer to the exhibit. PC1 is unable to access the web server at 209.165.200.226/27. Based on the provided output, what is the most likely cause of the problem?
  184. PC1 is not plugged in to RTR1.
  185. Port 80 is already in use on PC1.
  186. No DNS server is configured on PC1.
  187. #PC1 is configured with an incorrect IP address and default gateway.
  188.  
  189. 24
  190. What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
  191. DSL
  192. IAB
  193. NAP
  194. #SLA
  195.  
  196. 25
  197. Which term is associated with logical addressing?
  198. #IP addresses
  199. port addresses
  200. physical addresses
  201. Media Access Control addresses
  202.  
  203. 26
  204. Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?
  205. ping
  206. netstat
  207. #tracert
  208. nslookup
  209. ipconfig
  210.  
  211. 27
  212. Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
  213. They interconnect individual hosts.
  214. They interconnect multiple companies.
  215. #They interconnect local network segments.
  216. They interconnect the company network to the ISP.
  217.  
  218. 28
  219. Select three statements that correctly describe how DHCP services may be provided. (Choose three.)
  220. An integrated router provides IP configurations for most ISPs.
  221. #An integrated router can act as both DHCP server and DHCP client.
  222. A home PC using a static IP address obtained that address from a DHCP server.
  223. #Most home network integrated routers receive an IP configuration directly from their ISP.
  224. #A variety of devices can act as DHCP servers, as long as they run DHCP service software.
  225. A home PC that is unable to find a DHCP server defaults to the static IP address of 192.168.1.1.
  226.  
  227. 29
  228. Which two causes of networking problems are related to the physical layer? (Choose two.)
  229. #disconnected cables
  230. #improper operation of cooling fans
  231. incorrect MAC address
  232. incorrect default gateway
  233. incorrect subnet mask
  234.  
  235. 30
  236. Which installation option should be chosen when the current operating system is too damaged to work properly?
  237. upgrade
  238. multi-boot
  239. #clean install
  240. virtualization
  241.  
  242. 31
  243. What is an ISP?
  244. It is a standards body that develops cabling and wiring standards for networking.
  245. It is a protocol that establishes how computers within a local network communicate.
  246. #It is an organization that enables individuals and businesses to connect to the Internet.
  247. It is a networking device that combines the functionality of several different networking devices in one.
  248.  
  249. 32
  250. What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
  251. the CPU clock speed of the computer
  252. the number of network jacks that are in the room
  253. #if the user can ping the default gateway address
  254. if the word processing software is installed correctly
  255. #whether the PC uses dynamic or static IP addressing
  256.  
  257. 33
  258.  
  259.  
  260. Refer to the graphic. What feature can be installed on the Linksys integrated router to convert private IP addresses to Internet-routable addresses?
  261. authentication
  262. DHCP
  263. encryption
  264. firewall
  265. #NAT
  266. WEP
  267.  
  268. 34
  269. After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
  270. switch
  271. ISR router
  272. #firewall appliance
  273. standalone wireless access point
  274.  
  275. 35
  276. For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
  277. identifying the problem
  278. asking end-users questions
  279. #documenting the troubleshooting process
  280. using structured techniques to solve a problem
  281.  
  282. 36
  283. What is the default subnet mask for an IP address of 64.100.19.14?
  284. #255.0.0.0
  285. 255.255.0.0
  286. 255.255.255.0
  287. 255.255.255.255
  288.  
  289. 37
  290. How does a crossover cable make it possible for two "like devices" (for example, two switches) to communicate?
  291. The transmit pins are disconnected and only the receive pins are used.
  292. The transmit pins on one device are connected to the transmit pins on the other device.
  293. The receive pins on one device are connected to the receive pins on the other device.
  294. #The transmit pins on one device are connected to the receive pins on the other device.
  295.  
  296. 38
  297. What will be one result of using a wireless infrastructure when designing the communications infrastructure for a new building?
  298. #Wireless devices will be easy to add or relocate.
  299. Infrastructure installation will be difficult and expensive.
  300. There will be less interference from outside electronic sources.
  301. Data transmitted over wireless networks will be more secure than when transmitted over wired networks.
  302.  
  303. 39
  304. What does the term "attenuation" mean in data communication?
  305. #loss of signal strength as distance increases
  306. time for a signal to reach its destination
  307. leakage of signals from one cable pair to another
  308. strengthening of a signal by a networking device
  309.  
  310. 40
  311. Which type of computer has an integrated mouse?
  312. desktop
  313. #laptop
  314. mainframe
  315. server
  316. pocket PC
  317.  
  318. 41
  319. Which Windows command is used to display the configured IP address, subnet mask, and default gateway?
  320. #ipconfig
  321. netstat
  322. nslookup
  323. tracert
  324.  
  325. 42
  326. What must be identical on all devices in a WLAN for successful wireless communication between the devices?
  327. #SSID
  328. antenna type
  329. network mode
  330. wireless NIC driver
  331.  
  332. 43
  333. For devices that do not autosense, which connection requires a crossover cable?
  334. hub port to router port
  335. PC to hub port
  336. PC to switch port
  337. #PC port to PC port
  338.  
  339. 44
  340.  
  341.  
  342. Refer to the exhibit. A user on Host1 requests a web page from the web server. Which diagram is accurate for the encapsulation of the traffic that is sent from the user to the web server?
  343.  
  344. (D)
  345.  
  346.  
  347. 45
  348. What describes the external IP address that is obtained by a router through a cable or DSL modem?
  349. a public address that is obtained from ICANN
  350. a private address that is manually configured by the administrator
  351. #a public address that is obtained through DHCP from the ISP
  352. a private address that converts to a public address on the internal LAN
  353.  
  354. 46
  355. Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)
  356. MAC address
  357. #IP address
  358. kernel
  359. shell
  360. #subnet mask
  361.  
  362. 47
  363. What destination IP address is used in a unicast packet?
  364. #a specific host
  365. a group of hosts
  366. all hosts on the network
  367. the network broadcast address
  368.  
  369. 48
  370. Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
  371. FM
  372. radar
  373. #infrared
  374. ultraviolet
  375.  
  376. 49
  377. What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
  378. #ipconfig /release
  379. ipconfig /all
  380. ipconfig /flushdns
  381. #ipconfig /renew
  382. ipconfig
  383.  
  384. 50
  385. What are the two possible values for a digital bit? (Choose two.)
  386. #0
  387. #1
  388. A
  389. F
  390. #
  391. 9
  392.  
  393. 51
  394. Which picture shows a USB port on a PC?
  395. (I THINK YOU'ARE A SMART GUY)
  396.  
  397.  
  398. 52
  399. What is the purpose of a router?
  400. #to forward broadcasts to all interfaces so that all hosts receive them
  401. to maintain a table of individual host addresses
  402. to select the best path to reach remote networks
  403. to physically connect multiple hosts that belong to the same network
  404.  
  405. 1
  406. What is the purpose of TCP?
  407. to manage data links and physical network transmissions
  408. to specify the format of requests and responses that are exchanged between the client and server
  409. *to assign the logical address and encapsulate the request into packets for routing to the destination
  410. to provide flow control and acknowledgment of packets that are exchanged between the client and server
  411.  
  412. 2
  413. Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
  414. *NIC
  415. video card
  416. sound card
  417. internal modem
  418.  
  419. 3
  420. Which type of computer has an integrated mouse?
  421. desktop
  422. *laptop
  423. mainframe
  424. server
  425. pocket PC
  426.  
  427. 4
  428. After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
  429. switch
  430. ISR router
  431. *firewall appliance
  432. standalone wireless access point
  433.  
  434. 5
  435. Which installation option should be chosen when the current operating system is too damaged to work properly?
  436. upgrade
  437. multi-boot
  438. *clean install
  439. virtualization
  440.  
  441. 6
  442. A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
  443. *broadcast
  444. simulcast
  445. multicast
  446. unicast
  447.  
  448. 7
  449. What portion of the destination IP address is used as a packet is routed through the Internet?
  450. *subnet mask
  451. host portion
  452. network portion
  453. default gateway address
  454.  
  455. 8
  456. Which layer in the hierarchical Ethernet design model ensures that traffic between local networks will be allowed?
  457. core layer
  458. *access layer
  459. network layer
  460. distribution layer
  461.  
  462. 9
  463. What is the name for the contract between a customer and an ISP that specifies requirements for uptime and service response time?
  464. DSL
  465. IAB
  466. NAP
  467. *SLA
  468.  
  469. 10
  470. A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
  471. *ISP
  472. private IP addresses for each host
  473. static IP addresses for each host
  474. DHCP server
  475.  
  476. 11
  477. A user is not able to connect to the network. A PC technician replaces the network cable that connects the PC to the switch port. The user is now able to connect to the network. Which troubleshooting technique did the technician use?
  478. top-down
  479. substitution
  480. *divide-and-conquer
  481. a combination of top-down and divide-and-conquer
  482.  
  483. 12
  484. What component of a personal computer is responsible for the processing of all data?
  485. RAM
  486. *CPU
  487. firewall
  488. system bus
  489. operating system
  490.  
  491. 13
  492. Which two transport layer protocols are used to transfer messages between hosts? (Choose two.)
  493. DHCP
  494. FTP
  495. SMTP
  496. *TCP
  497. *UDP
  498.  
  499. 14
  500. Which device is often configured to act as both a DHCP client and a DHCP server?
  501. home PC
  502. *ISP modem
  503. wireless-enabled laptop
  504. integrated services router
  505.  
  506. 15
  507.  
  508.  
  509.  
  510. Refer to the exhibit. Which pair of addresses would be appropriate to use for PC1 and PC2 to establish a workgroup using private addresses?
  511. 127.0.0.1 and 127.0.0.2
  512. *172.16.4.2 and 172.16.4.3
  513. 172.16.5.1 and 192.168.3.2
  514. 198.133.219.25 and 198.133.219.26
  515.  
  516. What are two ways that a user can interact with an operating system shell? (Choose two.)
  517. *CLI
  518. OS
  519. *GUI
  520. NIC
  521. kernel
  522.  
  523. 17
  524. A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
  525. Place the web server in a DMZ.
  526. *Keep the web server on the external network.
  527. Configure a firewall device to serve as the web server.
  528. Locate the web server in the server farm of the internal network.
  529. *18
  530. Which wireless component allows wireless clients to gain access to a wired network?
  531. PDA
  532. STA
  533. access point
  534. *wireless bridge
  535.  
  536. *19
  537. Which two statements are characteristics of DHCP services? (Choose two.)
  538. *A DHCP client determines the lease time for using the IP address that is supplied by the DHCP server.
  539. An integrated router acts as the DHCP server to provide the IP address to the ISP.
  540. DHCP clients send a DHCP Discover message to the destination IP address of 255.255.255.255.
  541. *The DHCP server maps the IP addresses to host names.
  542. The integrated router acts as a DHCP server for internal hosts on local networks.
  543.  
  544. 20
  545. What is the correct sequence of steps in the encapsulation of TCP/IP data as it passes from a source to a destination host?
  546.  
  547. A. converts data to bits for transmission
  548. B. packages the data for end to end transport
  549. C. adds the data-link header and trailer
  550. D. adds the network IP address to the header of the packet
  551. A,B,C,D
  552. A,C,D,B
  553. *B,D,C,A
  554. B,C,D,A
  555. D,C,B,A
  556.  
  557. 21
  558.  
  559.  
  560.  
  561. Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?
  562. the default gateway on the host
  563. the IP address on the host
  564. the IP address on the router
  565. *the link status LED on the front of the router
  566. the subnet mask on the host
  567.  
  568. 22
  569. Which firewall resource could include the capability of recognizing and filtering DoS attacks?
  570. URL filtering
  571. application filtering
  572. *Layer 4 packet filtering
  573. stateful packet inspection
  574.  
  575. *23
  576. Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and password?
  577. brute force
  578. denial of service
  579. data manipulation
  580. *social engineering
  581.  
  582. *24
  583. Which type of network supports DHCP and DNS services for network users in a network domain?
  584. client/server
  585. peer-to-peer
  586. hierarchical
  587. *ad hoc
  588.  
  589. *25
  590. What is the purpose of pop-up blocker software?
  591. It detects and removes spyware.
  592. It detects and removes viruses.
  593. *It prevents the display of advertisement windows.
  594. It removes unwanted e-mail.
  595.  
  596. 26
  597. What are two best practices that are used when configuring a small home WLAN? (Choose two.)
  598. the use of EAP
  599. the encryption of the SSID
  600. the use of pre-shared keys
  601. the use of open authentication
  602. the disabling of SSID broadcasting
  603.  
  604. 27
  605. What is a service pack?
  606. an access policy
  607. an agreement between a company and a vendor
  608. a piece of code created to fix one specific problem
  609. *a collection of patches and updates released by a vendor
  610. a small piece of software designed specifically for security issues
  611.  
  612. *28
  613. Why would a corporate web server be assigned a public IP address instead of a private IP address?
  614. The public address can be acquired at no cost.
  615. *The public address can be routed on the Internet.
  616. The public address provides a security advantage.
  617. The same public address can be used on multiple servers to prevent depletion of available IP addresses.
  618.  
  619. 29
  620. When would a LAN switch use flooding to forward a frame?
  621. when the MAC address table is empty
  622. when retransmissions are required after a collision
  623. after all hosts on the network are added to the MAC table
  624. when a frame is received from a port that is connected to a hub
  625.  
  626. 30
  627.  
  628.  
  629.  
  630. Refer to the exhibit. The network is experiencing excessive broadcast traffic from multiple hosts. What can be done to reduce the broadcast traffic that each host receives without compromising connectivity to the corporate servers?
  631. Separate the switches with a router.
  632. Create a separate VLAN for the servers and hosts.
  633. Change from Ethernet switches to FastEthernet switches.
  634. Increase the number of switches to reduce the number of PCs that are connected to each switch.
  635.  
  636. What are two characteristics of a MAC address? (Choose two.)
  637. *It indicates the physical location of the host within the network.
  638. It is dynamically assigned by a DHCP server.
  639. *It is displayed in HEX characters.
  640. It is a physical address.
  641. It is cable-based.
  642.  
  643. *32
  644. What is an advantage of purchasing a custom-built computer?
  645. It is beneficial for less knowledgeable consumers.
  646. The waiting period for assembly is negligible.
  647. The cost is lower compared to a computer that has been preassembled.
  648. *The user can specify high-performance components to meet specific needs.
  649.  
  650. 33
  651. What are two examples of peripheral input devices? (Choose two.)
  652. external modem
  653. *barcode reader
  654. digital camera
  655. *plotter
  656. printer
  657.  
  658. 34
  659. A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
  660. *DSL
  661. dial-up
  662. satellite
  663. cell modem
  664. cable modem
  665.  
  666. 35
  667. Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
  668. FTP
  669. *POP3
  670. SMTP
  671. IMAP4
  672.  
  673. 36
  674. Which two statements are true about local applications? (Choose two.)
  675. They run on the network.
  676. An example of a local application is e-mail.
  677. *They are accessed from a remote computer.
  678. They are stored on the local hard disk.
  679. *They run on the computer where they are installed.
  680.  
  681. 37
  682. What is the purpose of the ipconfig /release command?
  683. *It forces a client to give up its current IP address.
  684. It forces a client to give up its current MAC address.
  685. It forces the client to clear all the MAC address to IP address associations it has learned.
  686. It shows the current IP configuration on the client.
  687.  
  688. 38
  689. Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
  690. DNS server
  691. MAC address
  692. *default gateway
  693. operating system
  694. wireless equipment vendor
  695.  
  696. 39
  697. A user has reported a failure to connect to the network. Based on similar calls from other users in the same location, the network technician starts troubleshooting by entering the ipconfig command on the user computer. Which troubleshooting technique is the technician using?
  698. top-down
  699. *bottom-up
  700. substitution
  701. divide-and-conquer
  702.  
  703. *40
  704. Which statement accurately describes what network devices do in the distribution layer of the three layer design model?
  705. They interconnect individual hosts.
  706. They interconnect multiple companies.
  707. They interconnect local network segments.
  708. They interconnect the company network to the ISP.
  709.  
  710. 41
  711.  
  712.  
  713.  
  714. Refer to the graphic. Based on the information that is shown, what statement is true?
  715. This configuration would be commonly found in an ad hoc wireless network.
  716. Any wireless client that is attached to this access point would have the same IP address and SSID.
  717. *All wireless devices that are connected to this access point must have an assigned SSID of Academy.
  718. In addition to accepting wireless client requests, this access point must connect to the wired network.
  719.  
  720. 42
  721. What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
  722. *RF
  723. ISM
  724. infrared
  725. Bluetooth
  726.  
  727. *43
  728. Which of the following statements best describes DNS?
  729. DNS servers are used to map an IP address to a physical address.
  730. *DNS servers are used to map a name to an IP address.
  731. DNS servers are used to configure logical address information for host computers.
  732. DNS servers are used to translate from private addresses to public addresses.
  733.  
  734. 44
  735.  
  736.  
  737.  
  738. Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
  739. authentication
  740. DHCP
  741. encryption
  742. firewall
  743. /*NAT
  744. WEP
  745.  
  746. *45
  747. What procedure will help prevent users from detecting a wireless network?
  748. Enable WEP.
  749. Enable MAC filtering.
  750. Disable SSID broadcasts.
  751. Change the default administrator password on the AP.
  752.  
  753. 1
  754. How does a crossover cable connect two routers?
  755. It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.
  756.  
  757. 2
  758. Which statement correctly describes the function of ARP?
  759. ARP is used by hosts to resolve an IP address to a MAC address for the destination host.
  760.  
  761. 3
  762. Which installation option should be chosen when the current operating system is too damaged to work properly?
  763. clean install
  764.  
  765. 4
  766. A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)
  767. 0
  768. 5
  769. Why does a router maintain an ARP table?
  770. to determine addressing of frames for delivery on a local network segment
  771.  
  772. 6
  773. What is the purpose of TCP?
  774. to manage data links and physical network transmissions
  775.  
  776. 7
  777. Which three address ranges can be used to depict private IP addresses? (Choose three.)
  778. 10.0.0.0 to 10.0.0.255
  779. 172.16.1.0 to 172.16.1.255
  780. 192.168.22.0 to 192.168.22.255
  781.  
  782. 8
  783. Which two causes of networking problems are related to the physical layer? (Choose two.)
  784. disconnected cables
  785. improper operation of cooling fans
  786.  
  787. 9
  788.  
  789. Refer to the exhibit. PC1 sends a data packet to PC4. When the router forwards the data out Fa0/1, what destination MAC address will the router place in the frame?
  790. 0200.545D.25F7
  791.  
  792. 10
  793. What are two ways that a user can interact with an operating system shell? (Choose two.)
  794. CLI
  795. GUI
  796.  
  797. 11
  798. What is a service pack?
  799. a collection of patches and updates released by a vendor
  800.  
  801. 12
  802. What component of a personal computer is responsible for the processing of all data?
  803. CPU
  804.  
  805. 13
  806. What is a major characteristic of asymmetric Internet service?
  807. Download speeds are faster than upload speeds.
  808.  
  809. 14
  810. What is the function of CSMA/CA in a WLAN?
  811. It assures that clients are connected to the correct WLAN.
  812.  
  813. 15
  814. For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
  815. identifying the problem
  816. 16
  817. What are two best practices that are used when configuring a small home WLAN? (Choose two.)
  818. the encryption of the SSID
  819. the use of pre-shared keys
  820.  
  821. 17
  822. Which portion of the packet does a router use to forward the packet to the destination?
  823. destination IP address
  824.  
  825. 18
  826. For devices that do not autosense, which connection requires a crossover cable?
  827. PC port to PC port
  828.  
  829. 19
  830. A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port?
  831. The computer is plugged in but no traffic is flowing.
  832.  
  833. 20
  834. Refer to the graphic. Based on the information that is shown, what statement is true?
  835. All wireless devices that are connected to this access point must have an assigned SSID of Academy.
  836.  
  837. 21
  838. Refer to the exhibit. A home network is configured with the information in the graphic. A user tries to manually create a new connection to the network using the SSID Ciscoclass. However, a connection cannot be made. What could be the problem?
  839. The SSID is case-sensitive.
  840.  
  841. 22
  842. How do ISPs obtain public IP addresses?
  843. They obtain the addresses from the RFC.
  844.  
  845. 23
  846. What two pieces of information should a help desk technician document while troubleshooting connectivity issues with an end user? (Choose two.)
  847. if the user can ping the default gateway address
  848. whether the PC uses dynamic or static IP addressing
  849.  
  850. 24
  851. Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?
  852. 128.107.255.1
  853.  
  854. 25
  855. Refer to the exhibit. With NAT overload configured on router R2, what is the inside global host address for packets that travel from host H1 to the Internet?
  856. 192.168.1.254
  857.  
  858. 26
  859. A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
  860. ISP
  861.  
  862. 27
  863. Which type of computer has an integrated mouse?
  864. laptop
  865.  
  866. 28
  867. An administrator is troubleshooting a network problem that involves the inability of users to reach Internet sites. During troubleshooting, the administrator is able to successfully ping web sites by their IP address, but pings to domain names are unsuccessful. Which service is most likely at fault?
  868. DNS
  869.  
  870. 29
  871. What is the purpose of pop-up blocker software?
  872. It prevents the display of advertisement windows.
  873. 30
  874. When would infrared be used to connect network devices?
  875. when synchronizing a PC with a PDA that is in line of sight
  876. 31
  877. Which two protocols are responsible for encrypting data on a wireless network? (Choose two.)
  878. WEP
  879. WPA
  880.  
  881. 32
  882. Which type of attack involves flooding a server port with SYN messages?
  883. data manipulation
  884.  
  885. 33
  886. Which of the following are transport layer protocols of the TCP/IP model? (Choose two.)
  887. UDP
  888. TCP
  889.  
  890. 34
  891. A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?
  892. dial-up
  893.  
  894. 35
  895. Which picture shows a USB port on a PC?
  896. (UCAN ANSWER IT BY YOURSELF)
  897. 36
  898. What type of message is sent to a specific group of hosts?
  899. unicast
  900.  
  901. 37
  902. What is an advantage of purchasing a custom-built computer?
  903. The cost is lower compared to a computer that has been preassembled.
  904.  
  905. 38
  906. Which device is often configured to act as both a DHCP client and a DHCP server?
  907. wireless-enabled laptop
  908.  
  909. 39
  910.  
  911. Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?
  912. the IP address on the router
  913.  
  914. 40
  915. Which two automatic addressing assignments are supported by DHCP? (Choose two.)
  916. subnet mask
  917. default gateway address
  918.  
  919. 41
  920. A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
  921. tracert
  922.  
  923. 42
  924. What is a weakness of WEP that is solved by WPA?
  925. WEP uses a fixed length key for every connection whereas WPA uses a different key length for each connection.
  926.  
  927. 43
  928. Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?
  929. tracert
  930.  
  931. 44
  932. What is the purpose of the ipconfig /release command?
  933. It forces the client to clear all the MAC address to IP address associations it has learned.
  934.  
  935. 45
  936. Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the web server?
  937.  
  938. DESTINATION IP ADDRESS : 172.16.1.1
  939. SOURCE IP ADDRESS : 172.16.1.10
  940. DESTINATION PORT : 80
  941. SOURCE PORT : 1048
  942. 46
  943. When would a LAN switch use flooding to forward a frame?
  944. when retransmissions are required after a collision
  945.  
  946. 47
  947. Which type of network supports DHCP and DNS services for network users in a network domain?
  948. client/server
  949.  
  950. 48
  951. What is the default subnet mask for an IP address of 64.100.19.14?
  952. 255.0.0.0
  953.  
  954. 49
  955. Two switches are interconnected in the same wiring closet. What type of cable is typically used for this connection?
  956. UTP crossover
  957.  
  958. 50
  959. Which two statements are true about local applications? (Choose two.)
  960. They are stored on the local hard disk.
  961. They run on the computer where they are installed.
  962.  
  963. 51
  964. Which IP address type is intended for a specific host?
  965. unicast
  966.  
  967. 52
  968. What are two examples of peripheral output devices? (Choose two.)
  969. headphones
  970. printer
  971.  
  972. 1
  973. Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
  974. remote access
  975.  
  976. 2
  977. What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
  978. ipconfig /release
  979. ipconfig /renew
  980.  
  981. 3
  982. For devices that do not autosense, which connection requires a crossover cable?
  983. PC port to PC port
  984.  
  985. 4
  986. Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
  987. NIC
  988.  
  989. 5
  990. Which wireless technology provides mutual two-way authentication?
  991. EAP
  992.  
  993. 6
  994. What component of a personal computer is responsible for the processing of all data?
  995. CPU
  996.  
  997. 7
  998. What statement describes the filtering of traffic via the use of Stateful Packet Inspection?
  999. It permits incoming packets that are legitimate responses to requests from internal hosts.
  1000.  
  1001. 8
  1002. Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
  1003. POP3
  1004.  
  1005. 9
  1006. Which protocol is used to transfer files among network devices and perform file-management functions?
  1007. FTP
  1008.  
  1009. 10
  1010. What is true about a wireless access point that is equipped with an omnidirectional antenna?
  1011. radiates the signal equally in all directions
  1012.  
  1013. 11
  1014. Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?
  1015. All wireless devices that are connected to this AP must have an assigned SSID of College.
  1016.  
  1017. 12
  1018. Which of the following statements best describes DNS?
  1019. DNS servers are used to map a name to an IP address.
  1020.  
  1021. 13
  1022. What is specified by the network number in an IP address?
  1023. the network to which the host belongs
  1024.  
  1025. 14
  1026. Which two causes of networking problems are related to the physical layer? (Choose two.)
  1027. damaged cables and connectors
  1028. overheated components
  1029.  
  1030. 15
  1031. What wireless technology has the ability to communicate with many devices at the same time, makes use of the 2.4 GHz band, and is limited to low-speed, short-range communications?
  1032. RF
  1033. 16
  1034. The help desk at a large packaging company receives a call from a user who is concerned about lost data files on the local PC. The help desk technician learns that the user clicked on an icon that appeared to be a program update, but no updates were scheduled for that program. What type of attack has likely occurred?
  1035. worm
  1036.  
  1037. 17
  1038. What are two examples of peripheral input devices? (Choose two.)
  1039. barcode reader
  1040. digital camera
  1041.  
  1042. 18
  1043. Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
  1044. The wireless connection is operational.
  1045.  
  1046. 19
  1047. What does it mean when a problem is being escalated by a helpdesk?
  1048. The helpdesk is moving the problem to a higher level support staff.
  1049.  
  1050. 20
  1051. Which three statements describe an IP address? (Choose three.)
  1052. An IP address is known as a logical address.
  1053. An IP address is found in the Layer 2 header during transmission.
  1054. An IP address is unique within the same local network.
  1055.  
  1056. 21
  1057. What advantage does a peer-to-peer network have over a client-server network?
  1058. It eliminates the need for centralized administration.
  1059.  
  1060. 22
  1061. A wireless DHCP client cannot connect to the Internet through a Linksys integrated router. When you type ipconfig on the host, no IP address, subnet mask, or default gateway shows. What are two of the first things you will check? (Choose two.)
  1062. if the wireless client is configured for DHCP
  1063. if the correct default gateway is configured on the integrated router
  1064.  
  1065. 23
  1066. Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?
  1067. all hosts that are connected to Switch1 and Switch2
  1068.  
  1069. 24
  1070. What is the purpose of pop-up blocker software?
  1071. It prevents the display of advertisement windows.
  1072.  
  1073. 25
  1074. A host wants to send information simultaneously to all the other hosts in the same network. Which domain will support this type of communication?
  1075. broadcast
  1076.  
  1077. 26
  1078. Which portion of the packet does a router use to forward the packet to the destination?
  1079. destination IP address
  1080.  
  1081. 27
  1082. What measurement is commonly used to describe communication speed when transferring data?
  1083. bps
  1084.  
  1085. 28
  1086. What procedure will help prevent users from detecting a wireless network?
  1087. Disable SSID broadcasts.
  1088.  
  1089. 29
  1090. How does a crossover cable connect two routers?
  1091. It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.
  1092.  
  1093. 30
  1094. Which Windows PC command line utility can be used to discover the path that a packet takes to reach a destination?
  1095. tracert
  1096. 31
  1097. What destination IP address is used in a unicast packet?
  1098. a specific host
  1099.  
  1100. 32
  1101. Which two automatic addressing assignments are supported by DHCP? (Choose two.)
  1102. subnet mask
  1103. default gateway address
  1104.  
  1105. 33
  1106. Which network design layer provides hosts with initial connectivity to the network?
  1107. distribution
  1108.  
  1109. 34
  1110. Which installation option should be chosen when the current operating system is too damaged to work properly?
  1111. clean install
  1112.  
  1113. 35
  1114. What are two advantages of purchasing a custom-built computer? (Choose two.)
  1115. user can specify higher performance components
  1116. supports higher-end graphics and gaming applications
  1117.  
  1118. 36
  1119. When would infrared be used to connect network devices?
  1120. when synchronizing a PC with a PDA that is in line of sight
  1121.  
  1122. 37
  1123. For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
  1124. identifying the problem
  1125.  
  1126. 38
  1127. What are two characteristics of IPv4 addresses? (Choose two.)
  1128. They consist of two parts.
  1129. They are Layer 2 addresses and are different for every computer.
  1130.  
  1131. 39
  1132. Which two statements are true about local applications? (Choose two.)
  1133. They are stored on the local hard disk.
  1134. They run on the computer where they are installed.
  1135.  
  1136. 40
  1137. Which picture shows a USB port on a PC?
  1138. (YOU CAN ANSWER IT)
  1139. 41
  1140. Why would a corporate web server be assigned a public IP address instead of a private IP address?
  1141. The public address can be routed on the Internet.
  1142.  
  1143. 42
  1144.  
  1145.  
  1146. Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
  1147. NAT
  1148.  
  1149. 43
  1150. What type of computer would most likely use a docking station?
  1151. laptop
  1152.  
  1153. 44
  1154. What is the default subnet mask for the IP address 128.107.23.10?
  1155. 255.255.0.0
  1156.  
  1157. 45
  1158. What are two characteristics of a MAC address? (Choose two.)
  1159. It is displayed in HEX characters.
  1160. It is a physical address.
  1161.  
  1162. 46
  1163. Which three addresses belong to the category of private IP addresses? (Choose three.)
  1164. 10.0.0.1
  1165. 172.16.0.1
  1166. 192.168.31.19
  1167.  
  1168. 47
  1169. Refer to the exhibit. A network technician is statically assigning an IP address to a PC. The default gateway is correct. What would be a valid IP address to assign to the host?
  1170. 128.107.255.1
  1171.  
  1172. 48
  1173. What is an ISP?
  1174. It is an organization that enables individuals and businesses to connect to the Internet.
  1175.  
  1176. 49
  1177. Which attribute must be the same for wireless devices on one network to be able to communicate with devices on a different network?
  1178. default gateway
  1179.  
  1180. 50
  1181. Which statement accurately describes a recommended strategy for end users to employ when they interact with a help desk technician?
  1182. Provide as much information about the problem as possible.
  1183.  
  1184. 51
  1185. Refer to the exhibit. Which option correctly represents the encapsulation of a packet that is sent by Host1 to the web server?
  1186. (D)
  1187.  
  1188. 52
  1189. Which Windows command is used to display the configured IP address, subnet mask, and default gateway?
  1190. ipconfig
  1191.  
  1192. 1
  1193. A technician is unsuccessful in establishing a console session between a PC and a Linksys integrated router. Both devices have power, and a cable is connected between them. Which two troubleshooting steps could help to diagnose this problem? (Choose two.)
  1194. #Ensure the correct cable is used.
  1195. #Ensure the link status LED on the integrated router is lit.
  1196.  
  1197. 2
  1198. Identify two physical-layer network problems. (Choose two.)
  1199. #hardware failure
  1200. #loose cable connections
  1201.  
  1202. 3
  1203. Only one workstation on a particular network cannot reach the Internet. What is the first troubleshooting step if the divide-and-conquer method is being used?
  1204. #Check the workstation TCP/IP configuration.
  1205.  
  1206. 4
  1207. Which two troubleshooting techniques are suitable for both home networks and large corporate networks? (Choose two.)
  1208. #documenting the troubleshooting process
  1209. #keeping a record of system upgrades and software versions
  1210.  
  1211. 5
  1212. What two items could be checked to verify connectivity between the router and the ISP? (Choose two.)
  1213. #router status page
  1214. #connectivity status as indicated by LEDs
  1215.  
  1216. 6
  1217. When acting as a DHCP server, what three types of information can an ISR provide to a client? (Choose three.)
  1218. #default gateway
  1219. #dynamic IP address
  1220. #DNS server address
  1221.  
  1222. 7
  1223. A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent?
  1224. #substitution
  1225.  
  1226. 8
  1227. Which troubleshooting method begins by examining cable connections and wiring issues?
  1228. #bottom-up
  1229.  
  1230. 9
  1231. What command is used to determine the location of delay for a packet traversing the Internet?
  1232. #tracert
  1233.  
  1234. 10
  1235. A technician suspects that a Linksys integrated router is the source of a network problem. While troubleshooting, the technician notices a blinking green activity LED on some of the ports. What does this indicate?
  1236. #The ports are operational and are receiving traffic.
  1237.  
  1238. 11
  1239. Which three settings must match on the client and access point for a wireless connection to occur? (Choose three.)
  1240. #SSID
  1241. #authentication
  1242. #encryption key
  1243.  
  1244. 12
  1245. What should a network administrator do first after receiving a call from a user who cannot access the company web server?
  1246. #Ask the user what URL has been typed and what error message displays.
  1247.  
  1248. 13
  1249.  
  1250. Refer to the graphic. What configuration is incorrect in the network shown?
  1251. #The wired connection is the wrong type of cable.
  1252.  
  1253. 14
  1254. A technician is troubleshooting a security breach on a new wireless access point. Which three configuration settings make it easy for hackers to gain access? (Choose three.)
  1255. #broadcasting the SSID
  1256. #using open authentication
  1257. #using the default internal IP address
  1258.  
  1259. 15
  1260.  
  1261. Refer to the graphic. What configuration is incorrect in the network shown?
  1262. #The host IP address is incorrect.
  1263.  
  1264. 16
  1265. Typically, help desk personnel assist end users in which two tasks? (Choose two.)
  1266. #identifying when the problem occurred
  1267. #implementing the solution to the problem
  1268.  
  1269. 17
  1270. Network baselines should be performed in which two situations? (Choose two.)
  1271. #after the network is installed and running optimally
  1272. #after major changes are implemented on the network
  1273.  
  1274. 18
  1275. Which two items should be added to the documentation following a troubleshooting event? (Choose two.)
  1276. #final resolution
  1277. #results of successful and unsuccessful troubleshooting steps
  1278.  
  1279. 19
  1280. A PC is plugged into a switch and is unable to connect to the network. The UTP cable is suspected. What could be the problem?
  1281. #A crossover cable is being used.
  1282.  
  1283. 20
  1284. Which ipconfig command requests IP configuration from a DHCP server?
  1285. #ipconfig /renew
  1286.  
  1287. 21
  1288.  
  1289. Refer to the graphic. The wireless host cannot access the Internet, but the wired host can. What is the problem?
  1290. #The host WEP key is incorrect.
  1291.  
  1292. 22
  1293. How does remote-access software help in the troubleshooting process?
  1294. #Diagnostics can be run without a technician being present at the site.
  1295.  
  1296. 23
  1297. What command is used to determine if a DNS server is providing name resolution?
  1298. #nslookup
  1299.  
  1300. 1
  1301. Identify three techniques used in social engineering. (Choose three.)
  1302. #vishing
  1303. #phishing
  1304. #pretexting
  1305.  
  1306. 2
  1307. A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?
  1308. #SYN flooding
  1309.  
  1310. 3
  1311. While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred?
  1312. #Trojan horse
  1313.  
  1314. 4
  1315. What is a major characteristic of a Worm?
  1316. #exploits vulnerabilities with the intent of propagating itself across a network
  1317.  
  1318. 5
  1319. During a pretexting event, how is a target typically contacted?
  1320. #by phone
  1321.  
  1322. 6
  1323. What term is used to describe a dedicated hardware device that provides firewall services?
  1324. #appliance-based
  1325.  
  1326. 7
  1327.  
  1328. Refer to the graphic. In the Linksys Security menu, what does the SPI Firewall Protection option Enabled provide?
  1329. #It requires that packets coming into the router be responses to internal host requests.
  1330.  
  1331. 8
  1332. Many best practices exist for wired and wireless network security. The list below has one item that is not a best practice. Identify the recommendation that is not a best practice for wired and wireless security.
  1333. #Disable the wireless network when a vulnerability analysis is being performed.
  1334.  
  1335. 9
  1336. What environment would be best suited for a two-firewall network design?
  1337. #a large corporate environment
  1338.  
  1339. 10
  1340. Which statement is true about port forwarding within a Linksys integrated router?
  1341. #Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.
  1342.  
  1343. 11
  1344. Which two statements are true concerning anti-spam software? (Choose two.)
  1345. #When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake.
  1346. #Even with anti-spam software installed, users should be careful when opening e-mail attachments.
  1347.  
  1348. 12
  1349. What type of advertising is typically annoying and associated with a specific website that is being visited?
  1350. #popups
  1351.  
  1352. 13
  1353. To which part of the network does the wireless access point part of a Linksys integrated router connect?
  1354. #internal
  1355.  
  1356. 14
  1357. What statement is true about security configuration on a Linksys integrated router?
  1358. #Internet access can be denied for specific days and times.
  1359.  
  1360. 15
  1361. Which abbreviation refers to an area of the network that is accessible by both internal, or trusted, as well as external, or untrusted, host devices?
  1362. #DMZ
  1363.  
  1364. 16
  1365. Which statement is true regarding anti-virus software?
  1366. #Only after a virus is known can an anti-virus update be created for it.
  1367.  
  1368. 17
  1369. What is one function that is provided by a vulnerability analysis tool?
  1370. #It identifies missing security updates on a computer.
  1371.  
  1372. 18
  1373. What part of the security policy states what applications and usages are permitted or denied?
  1374. #acceptable use
  1375.  
  1376. 19
  1377. What best practice relates to wireless access point security?
  1378. #a change of the default IP address
  1379.  
  1380. 20
  1381. What is a widely distributed approach to marketing on the Internet that advertises to as many individual users as possible via IM or e-mail?
  1382. #spam
  1383.  
  1384. 1
  1385. Complete the following sentence: WEP is used to ______ , and EAP is used to _____ wireless networks.
  1386. #encrypt; authenticate users on
  1387.  
  1388. 2
  1389. What are three advantages of wireless over wired technology? (Choose three.)
  1390. #anytime, anywhere connectivity
  1391. #ease of adding additional devices
  1392.  
  1393. 3
  1394. A technician has been asked to provide wireless connectivity to the wired Ethernet network of a building. Which three factors affect the number of access points needed? (Choose three.)
  1395. #the size of the building
  1396. #the number of solid interior walls in the building
  1397. #the presence of microwave ovens in several offices
  1398.  
  1399. 4
  1400. Which statement is true concerning wireless bridges?
  1401. #connects two networks with a wireless link
  1402.  
  1403. 5
  1404.  
  1405.  
  1406. Refer to the graphic. In the Wireless menu option of a Linksys integrated router, what does the Network Mode option Mixed mean?
  1407. #The router supports 802.11b, 802.11g, and 802.11n devices.
  1408.  
  1409. 6
  1410. Why is IEEE 802.11 wireless technology able to transmit further distances than Bluetooth technology?
  1411. #has higher power output
  1412.  
  1413. 7
  1414. Which statement is true concerning an ad-hoc wireless network?
  1415. #created by connecting wireless clients in a peer-to-peer network
  1416.  
  1417. 8
  1418. What is the difference between using open authentication and pre-shared keys?
  1419. #Pre-shared keys require an encrypted secret word. Open authentication does not require a secret word.
  1420.  
  1421. 9
  1422. Which statement is true about open authentication when it is enabled on an access point?
  1423. #requires no authentication
  1424.  
  1425. 10
  1426. Which WLAN component is commonly referred to as an STA?
  1427. #wireless client
  1428.  
  1429. 11
  1430. Which two statements about a service set identifier (SSID) are true? (Choose two.)
  1431. #tells a wireless device to which WLAN it belongs
  1432. #all wireless devices on the same WLAN must have the same SSID
  1433.  
  1434. 12
  1435. Why is security so important in wireless networks?
  1436. #Wireless networks broadcast data over a medium that allows easy access.
  1437.  
  1438. 13
  1439. What term describes the encoding of wireless data to prevent intercepted data from being read by a hacker?
  1440. #encryption
  1441.  
  1442. 14
  1443. What type of authentication do most access points use by default?
  1444. #Open
  1445.  
  1446. 15
  1447. What are two authentication methods that an access point could use? (Choose two.)
  1448. #EAP
  1449. #pre-shared keys
  1450.  
  1451. 16
  1452. What are two benefits of wireless networking over wired networking? (Choose two.)
  1453. #mobility
  1454. #reduced installation time
  1455.  
  1456. 17
  1457.  
  1458.  
  1459. Refer to the graphic. In the Wireless menu of a Linksys integrated router, what configuration option allows the presence of the access point to be known to nearby clients?
  1460. #SSID Broadcast
  1461.  
  1462. 18
  1463. What are the two WEP key lengths? (Choose two.)
  1464. #64 bit
  1465. #128 bit
  1466.  
  1467. 19
  1468. Which two statements characterize wireless network security? (Choose two.)
  1469. #With SSID broadcast disabled, an attacker must know the SSID to connect.
  1470. #Using the default IP address on an access point makes hacking easier.
  1471.  
  1472. 20
  1473. What does the Wi-Fi logo indicate about a wireless device?
  1474. #The device is interoperable with other devices of the same standard that also display the Wi-Fi logo.
  1475.  
  1476. 21
  1477. What access-point feature allows a network administrator to define what type of data can enter the wireless network?
  1478. #traffic filtering
  1479.  
  1480. 1
  1481. What is the correct order of the layers of the OSI reference model, starting at the lowest layer and working up the model?
  1482. #physical, data link, network, transport, session, presentation, application
  1483.  
  1484. 2
  1485. What three items are contained in an Ethernet header and trailer? (Choose three.)
  1486. #source MAC address
  1487. #destination MAC address
  1488. #error-checking information
  1489.  
  1490. 3
  1491. Which protocols are TCP/IP application layer protocols? (Choose two.)
  1492. #FTP
  1493. #SMTP
  1494.  
  1495. 4
  1496. Refer to the graphic. Which protocol is used to access this website?
  1497. #HTTP
  1498.  
  1499. 5
  1500. What is an advantage of the use of layers in the OSI reference model?
  1501. #It prevents changes in one layer from affecting other layers.
  1502.  
  1503. 6
  1504. What term is used to describe how TCP/IP protocols are layered and interact to format, address, and transmit information across a network?
  1505. #protocol stack
  1506.  
  1507. 7
  1508. Whenever e-mail clients send letters, what device is used to translate the domain names into their associated IP addresses?
  1509. #DNS server
  1510.  
  1511. 8
  1512. An Internet server is running both FTP and HTTP services. How does the server know which of these applications should handle an incoming segment?
  1513. #The segment destination port number identifies the application that should handle it.
  1514.  
  1515. 9
  1516. You are creating a network-based video game. What influences your decision about which transport protocol to use for the application?
  1517. #UDP will not disrupt the game to retransmit dropped packets.
  1518.  
  1519. 10
  1520. Which port number is used by SMTP?
  1521. #25
  1522.  
  1523. 11
  1524. Which application is most likely used to translate www.cisco.com to 198.133.219.25?
  1525. #DNS
  1526.  
  1527. 12
  1528. Which of the following are layers of the TCP/IP model? (Choose three.)
  1529. #Application
  1530. #Internet
  1531. #Network Access
  1532.  
  1533. 13
  1534. Which protocol is used by e-mail servers to communicate with each other?
  1535. #SMTP
  1536.  
  1537. 14
  1538. What client software enables logged in users to communicate with other logged in users in real time?
  1539. #instant messaging
  1540.  
  1541. 15
  1542. What type of server would use IMAP?
  1543. #e-mail
  1544.  
  1545. 16
  1546. What resolves a website URL to an IP address?
  1547. #DNS server
  1548.  
  1549. 17
  1550. What information is contained in an IP header?
  1551. #source and destination IP addresses
  1552.  
  1553. 18
  1554. Which protocol is used by FTP to transfer files over the Internet?
  1555. #TCP
  1556.  
  1557. 19
  1558. A client has decoded a frame and started the de-encapsulation process. In which order does the de-encapsulation process occur?
  1559.  
  1560. 1) remove Ethernet header and trailer
  1561. 2) remove IP header
  1562. 3) remove TCP header
  1563. 4) pass data to the application
  1564.  
  1565.  
  1566.  
  1567. 20
  1568. A device receives an Ethernet frame and recognizes the MAC address as its own. What does the device do to the message to get to the encapsulated data?
  1569. #removes the Ethernet header and trailer
  1570.  
  1571. 21
  1572. Cabling issues are associated with which OSI layer?
  1573. #1
  1574.  
  1575. 22
  1576. A network client in a corporate environment reboots. Which type of server would most likely be used first?
  1577. #DNS
  1578.  
  1579. 1
  1580. Which two statements describe packets that are sent through a Linksys integrated router using NAT? (Choose two.)
  1581. #Packets that are sent to a destination outside the local network need to be translated.
  1582. #Packets that are sent between hosts on the same local network do not need to be translated.
  1583.  
  1584. 2
  1585. A PC obtains its IP address from a DHCP server. If the PC is taken off the network for repair, what happens to the IP address configuration?
  1586. #The address is returned to the pool for reuse when the lease expires.
  1587.  
  1588. 3
  1589. What is the destination MAC address in a multicast Ethernet frame?
  1590. #an address that begins with 01-00-5E in hexadecimal
  1591.  
  1592. 4
  1593. How many bits are available for Class B host IP addresses using a default subnet mask?
  1594. #16
  1595.  
  1596. 5
  1597. Which default subnet mask provides the most host bits?
  1598. #255.0.0.0
  1599.  
  1600.  
  1601. 6
  1602.  
  1603.  
  1604. Refer to the graphic. NAT and DHCP are installed on the Linksys integrated router. Which IP address is most likely to be assigned to the local computer, Host1?
  1605. #10.0.0.17
  1606.  
  1607. 7
  1608.  
  1609.  
  1610. Refer to the graphic. The host requests an IP configuration from the Linksys integrated router which is configured to provide DHCP services. In addition to the host IP address, which additional IP address is provided that will allow the host to access the ISP and the Internet?
  1611. #internal IP address of the integrated router that connects to the local network
  1612.  
  1613. 8
  1614.  
  1615.  
  1616. Refer to the graphic. A user at the workstation cannot connect to the server. All cables have been tested and are working and all devices have IP addressing. However, the user cannot ping the server. What is causing the problem?
  1617. #The workstation and server are on different logical networks.
  1618.  
  1619. 9
  1620. Which part of an IP address identifies a specific device on a network?
  1621. #host portion
  1622.  
  1623. 10
  1624. Which type of server dynamically assigns an IP address to a host?
  1625. #DHCP
  1626.  
  1627. 11
  1628. What is one of the purposes of NAT?
  1629. #prevents external users from detecting the IP addresses used on a network
  1630.  
  1631. 12
  1632. Assuming a default mask, which portion of the IP address 175.124.35.4 represents the host?
  1633. #35.4
  1634.  
  1635. 13
  1636. How large are IPv4 addresses?
  1637. #32 bits
  1638.  
  1639. 14
  1640. Which statement is true concerning private IP addresses?
  1641. #solves the issue of a finite number of available public IP addresses
  1642.  
  1643. 15
  1644. Yvonne is talking to her friend on the phone. What type of message is this?
  1645. #unicast
  1646.  
  1647.  
  1648. 16
  1649. Which of the following are private IP addresses? (Choose three.)
  1650. #10.1.1.1
  1651. #172.16.4.4
  1652. #192.168.5.5
  1653.  
  1654. 17
  1655. Which three statements describe a DHCP Discover message? (Choose three.)
  1656. #The destination IP address is 255.255.255.255.
  1657. #The message comes from a client seeking an IP address.
  1658. #All hosts receive the message, but only a DHCP server replies.
  1659.  
  1660. 18
  1661. What destination IP address is used in a unicast packet?
  1662. #a specific host
  1663.  
  1664. 19
  1665. How many usable hosts are available given a Class C IP address with the default subnet mask?
  1666. #254
  1667.  
  1668. 20
  1669. What information must be included within a unicast message for it to be delivered on an Ethernet network?
  1670. #MAC and IP addresses that correspond to a specific destination host
  1671.  
  1672. 21
  1673. A host with the IP address 172.32.65.13 and a default mask belongs to what network?
  1674. #172.32.0.0
  1675.  
  1676. 1
  1677. Which definition describes the term Internet?
  1678. #a network of networks that connects countries around the world
  1679.  
  1680. 2
  1681. What type of connection point is a point of presence (POP)?
  1682. #between an ISP and a home-based LAN
  1683.  
  1684. 3
  1685. What is the term for the group of high-speed data links that interconnect ISPs?
  1686. #Internet backbone
  1687.  
  1688. 4
  1689. What are three characteristics of business class ISP service? (Choose three.)
  1690. # fast connections
  1691. # extra web space
  1692. # additional e-mail accounts
  1693.  
  1694. 5
  1695. What does the tracert command test?
  1696. #the network path to a destination
  1697.  
  1698. 6
  1699. What is a major characteristic of asymmetric Internet service?
  1700. #Upload speeds and download speeds are different.
  1701.  
  1702. 7
  1703. Which three elements are required to successfully connect to the Internet? (Choose three.)
  1704. #an IP address
  1705. #a network connection
  1706. #access to an Internet service provider
  1707.  
  1708. 8
  1709. Which two places are most appropriate to use UTP cabling? (Choose two.)
  1710. # in a home office network
  1711. # inside a school building
  1712.  
  1713. 9
  1714. Which device can act as a router, switch, and wireless access point in one package?
  1715. #ISR
  1716.  
  1717. 10
  1718. What type of end-user connectivity requires that an ISP have a DSLAM device in their network?
  1719. #digital subscriber line technology
  1720.  
  1721. 11
  1722. Why would an ISP require a CMTS device on their network?
  1723. #to connect end users using cable technology
  1724.  
  1725. 12
  1726.  
  1727. Refer to the graphic. What type of cabling is shown?
  1728. #fiber
  1729.  
  1730. 13
  1731.  
  1732. Refer to the graphic. What type of cabling is shown?
  1733. #UTP
  1734.  
  1735. 14
  1736. Which two characteristics describe copper patch panels? (Choose two.)
  1737. #uses RJ-45 jacks
  1738. #allows quick rearrangements of network connections
  1739.  
  1740. 15
  1741. What term describes each router through which a packet travels when moving between source and destination networks?
  1742. #hop
  1743.  
  1744. 16
  1745. What does adherence to cabling standards ensure?
  1746. # reliable data communications
  1747.  
  1748. 17
  1749. What connector is used to terminate Ethernet unshielded twisted pair (UTP) cabling?
  1750. # RJ-45
  1751.  
  1752. 18
  1753. Refer to the graphic. What type of cable is shown?
  1754. #crossover
  1755.  
  1756. 19
  1757. What are two advantages of cable management? (Choose two.)
  1758. #aids in isolation of cabling problems
  1759. #protects cables from physical damage
  1760.  
  1761. 20
  1762. What are two common causes of signal degradation when using UTP cabling? (Choose two.)
  1763. #having improper termination
  1764. #using low quality cables or connectors
  1765.  
  1766. 21
  1767. What are three commonly followed standards for constructing and installing cabling? (Choose three.)
  1768. #pinouts
  1769. #cable lengths
  1770. #connector types
  1771.  
  1772. 1
  1773. Which two statements concerning networking standards are true? (Choose two.)
  1774. #provides consistent interconnections across networks
  1775. #simplifies new product development
  1776.  
  1777. 2
  1778. Which two items are included in a network logical map? (Choose two.)
  1779. #naming scheme
  1780. #IP addressing scheme
  1781.  
  1782. 3
  1783. What is a reason for disabling simple file sharing?
  1784. #It enables the user to set more specific security access levels.
  1785.  
  1786. 4
  1787. Which address does an NIC use when deciding whether to accept a frame?
  1788. #destination MAC address
  1789.  
  1790. 5
  1791. If the default gateway is configured incorrectly on the host, what is the impact on communications?
  1792. #The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
  1793.  
  1794. 6
  1795.  
  1796. Refer to the graphic. What does the router do after it determines that a data packet from Network 1 should be forwarded to Network 2?
  1797. #It reassembles the frame with different MAC addresses than the original frame.
  1798.  
  1799. 7
  1800. What is the function of the FCS field in an Ethernet frame?
  1801. #detects transmission errors
  1802.  
  1803. 8
  1804. Host A needs to learn the MAC address of Host B, which is on the same LAN segment. A message has been sent to all the hosts on the segment asking for the MAC address of Host B. Host B responds with its MAC address and all other hosts disregard the request. What protocol was used in this scenario?
  1805. #ARP
  1806.  
  1807. 9
  1808. What is a benefit of having a router within the distribution layer?
  1809. #keeps broadcasts contained within a local network
  1810.  
  1811. 10
  1812. Which term is used to describe the process of placing one message format into another format so that the message can be delivered across the appropriate medium?
  1813. #encapsulation
  1814.  
  1815. 11
  1816. Which table does a router use to make decisions about the interface through which a data packet is to be sent?
  1817. #routing table
  1818.  
  1819. 12
  1820. Which two networking devices are used to connect hosts to the access layer? (Choose two.)
  1821. #hub
  1822. #switch
  1823.  
  1824. 13
  1825. What does the 100 mean when referencing the 100BASE-T Ethernet standard?
  1826. #speed of transmission
  1827.  
  1828. 14
  1829. What device is typically used as the default gateway for a computer?
  1830. #the router interface closest to the computer
  1831.  
  1832. 15
  1833.  
  1834. Refer to the graphic. Five PCs are connected through a hub. If host H1 wants to reply to a message from host H2, which statement is true?
  1835. #H1 sends a unicast message to H2, but the hub forwards it to all devices.
  1836.  
  1837.  
  1838. 16
  1839. Which type of address is used in an Ethernet frame header?
  1840. #MAC addresses only
  1841.  
  1842. 17
  1843. A switch receives a frame with a destination MAC address that is currently not in the MAC table. What action does the switch perform?
  1844. #It floods the frame out of all active ports, except the origination port.
  1845.  
  1846. 18
  1847. Which device accepts a message on one port and always forwards the message to all other ports?
  1848. #hub
  1849.  
  1850. 19
  1851. What type of route allows a router to forward packets even though its routing table contains no specific route to the destination network?
  1852. #default route
  1853.  
  1854. 20
  1855. An integrated router can normally perform the functions of which two other network devices? (Choose two.)
  1856. #switch
  1857. #wireless access point
  1858.  
  1859. 21
  1860. What is the purpose of logical addresses in an IP network?
  1861. #They are used to determine which host device accepts the frame.
  1862.  
  1863. 1
  1864. Which method of interacting with an operating system involves typing commands at a command prompt?
  1865. #CLI
  1866.  
  1867. 2
  1868. What occurs when computers are configured to receive their network configurations dynamically?
  1869. #Each computer requests configuration information from a server.
  1870.  
  1871. 3
  1872. An operating system is severely damaged. All data on the partition needs to be deleted, and all application software must be reinstalled. Which installation method should be used to correct the problem?
  1873. #clean install
  1874.  
  1875. 4
  1876. Which Windows file system is more likely to be used in an enterprise-level environment?
  1877. #NTFS
  1878.  
  1879. 5
  1880. What are two ways that a user can interact with an operating system shell? (Choose two.)
  1881. #CLI
  1882. #GUI
  1883.  
  1884. 6
  1885. Windows XP has a known problem with specific Intel processors. What is the best course of action to take in this situation?
  1886. #Download and install the Windows patch that fixes this problem.
  1887.  
  1888. 7
  1889. The Lesson TaskMaster application from ChalkBoard has a problem. Every time the software is installed and loaded on a Windows XP-based Dell computer, and the moment something is typed followed by a tab, two tabs are inserted instead of one. What would be the best solution to this problem?
  1890. #Download, install, and apply a patch from ChalkBoard.
  1891.  
  1892. 8
  1893. Which two statements are true about drive partitions? (Choose two.)
  1894. #Partitions are necessary in multi-boot installations.
  1895. #A hard drive can be divided into an operating system partition and a data partition.
  1896.  
  1897. 9
  1898. What is the purpose of a default gateway?
  1899. #identifies the device that allows local network computers to communicate with devices on other networks
  1900.  
  1901. 10
  1902. What Explorer menu option is used to determine the Windows XP version installed on a computer?
  1903. #Help
  1904.  
  1905. 11
  1906. Which three resource specifications are given by the manufacturer to ensure that an operating system performs as designed? (Choose three.)
  1907. #required hard disk space
  1908. #processor type and speed
  1909. #recommended amount of RAM
  1910.  
  1911. 12
  1912. Which three pieces of information must be specified on a computer to allow that computer to send and receive information across networks? (Choose three.)
  1913. #IP address
  1914. #subnet mask
  1915. #default gateway
  1916.  
  1917. 13
  1918. Which Windows XP Automatic Update option allows you to select the time when a Windows update is executed?
  1919. #Automatic (recommended).
  1920.  
  1921. 14
  1922. Which two items must be unique to each computer and cannot be duplicated on a network? (Choose two.)
  1923. #computer name
  1924. #IP address
  1925.  
  1926. 15
  1927. Which two statements should be included in a pre-installation checklist when upgrading an operating system? (Choose two.)
  1928. #Verify that the hardware resources meet or exceed the published minimum requirements.
  1929. #Complete a full backup of all important files and data.
  1930.  
  1931. 16
  1932. What two items are available from the About Windows option through the Windows Explorer Help menu? (Choose two.)
  1933. #the end-user license agreement
  1934. #the operating system version number
  1935.  
  1936. 17
  1937. What are three characteristics of an operating system that is released under the GPL (GNU Public License)? (Choose three.)
  1938. #full access to source code
  1939. #software often available free
  1940. #support normally user-based and often free
  1941.  
  1942. 18
  1943. Which statement is true about installing an operating system on computers in a networked environment?
  1944. #The computer name must be unique for all computers on the same network.
  1945.  
  1946. 19
  1947. A computer in the Advanced Technology Center computer room on the second floor, room number 217, has the computer name ATC_217_7. What fact is true about the computer name?
  1948. #The name makes it easier for users to reference the device when connecting to it to share resources.
  1949.  
  1950. 20
  1951. Which operating system patch installation method is used when a user is notified of a security update for remotely accessing a computer, but wishes not to install this patch?
  1952. #prompt for permission
  1953.  
  1954. 1
  1955. Which adapter enables a computer system to exchange information with other systems on a local network?
  1956. #network interface card
  1957.  
  1958. 2
  1959. What measurement is commonly associated with computer processing speed?
  1960. #hertz
  1961.  
  1962. 3
  1963. Which computer component is considered the nerve center of the computer system and is responsible for processing all of the data within the machine?
  1964. #CPU
  1965.  
  1966. 4
  1967. Why do servers often contain duplicate or redundant parts?
  1968. #Servers should be accessible at all times.
  1969.  
  1970. 5
  1971. What are two benefits of connecting a laptop computer to a docking station? (Choose two.)
  1972. #Less power is required.
  1973. #An external monitor can be used.
  1974.  
  1975. 6
  1976. What characteristic of word processing software would make it a local application?
  1977. #The software is stored on the local hard drive.
  1978.  
  1979. 7
  1980. A user plans to run multiple applications simultaneously on a computer. Which computer component is essential to accomplish this?
  1981. #RAM
  1982.  
  1983. 8
  1984. What are two advantages of purchasing a preassembled computer? (Choose two.)
  1985. #usually a lower cost
  1986. #adequate for performing most general applications
  1987.  
  1988. 9
  1989. Applications can be grouped into general use software or industry specific software. What are two examples of industry specific software? (Choose two.)
  1990. #an educational tool
  1991. #medical practice management software
  1992.  
  1993. 10
  1994. What is the main storage drive used by servers, desktops, and laptops?
  1995. #hard drive
  1996.  
  1997. 11
  1998. A user reports that a peripheral device that was installed correctly last week has not been functioning since the PC was booted today. All other PC functions are working properly. What are three things a service technician should do to solve the problem? (Choose three.)
  1999. #Use the testing functionality on the peripheral itself, if available.
  2000. #Disconnect all cables connected to the computer except those connected to the peripheral.
  2001. #Ensure that the peripheral is powered on.
  2002.  
  2003. 12
  2004. What two functions does a UPS provide that a surge protector does not? (Choose two.)
  2005. #It provides backup power from an internal battery.
  2006. #It gives the user time to safely shut down the computer if the power fails.
  2007.  
  2008. 13
  2009. Which component is designed to remove high-voltage spikes and surges from a power line so that they do not damage a computer system?
  2010. #surge suppressor
  2011.  
  2012. 14
  2013. Because of the potentially dangerous voltage levels, which two devices should you not open unless you have been specifically trained to work on them? (Choose two.)
  2014. #monitor
  2015. #power supply
  2016.  
  2017. 15
  2018. What can be used to prevent electrostatic discharge (ESD)?
  2019. #dry and non humid conditions
  2020.  
  2021.  
  2022. 16
  2023. How many unique values are possible using a single binary digit?
  2024. #2
  2025.  
  2026. 17
  2027. Administrators at a multicampus college need access to their schedules wherever the administrators go. Which computing device would be the most appropriate?
  2028. #PDA
  2029.  
  2030. 18
  2031. Which two steps should be performed when installing a peripheral device? (Choose two.)
  2032. #Download and install the most current driver.
  2033. #Connect the peripheral using an appropriate cable or wireless connection.
  2034.  
  2035. 19
  2036. How is a server different from a workstation computer?
  2037. #The server provides services to clients.
  2038.  
  2039. 20
  2040. Which three terms describe different types of computers? (Choose three.)
  2041. #laptop
  2042. #desktop
  2043. #mainframe
  2044.  
  2045. 21
  2046. In newer operating systems, how are system resources assigned by default when components are installed?
  2047. #dynamically assigned between the component and the operating system
  2048.  
  2049. 1
  2050. When using NAT on a router, what is the term for the IP address of an inside host as it appears to the outside network?
  2051. inside local
  2052. #inside global
  2053. outside local
  2054. outside global
  2055.  
  2056. 2
  2057. In order to load an initial configuration on a new switch, a network administrator has connected a laptop to the switch via the use of a console cable. About a minute after the network administrator powers on the switch, the SYST LED on the front of the switch changes from blinking green to amber. What does this indicate?
  2058. The network administrator has made an improper physical connection to the switch.
  2059. The switch is ready to have a configuration file loaded.
  2060. A port on the switch is bad.
  2061. #The switch failed POST.
  2062.  
  2063. 3
  2064. Which routing protocol excludes the subnet information from routing updates?
  2065. EIGRP
  2066. OSPF
  2067. #RIPv1
  2068. BGP
  2069.  
  2070. 4
  2071. Which layer of the OSI model handles common protocols and technologies including Ethernet, WLAN, Wi-Fi, ATM, and PPP?
  2072. Layer 1
  2073. #Layer 2
  2074. Layer 3
  2075. Layer 4
  2076. Layer 7
  2077.  
  2078. 5
  2079. Refer to the exhibit. Which three IP addresses could be assigned to the hosts? (Choose three.)
  2080. 192.168.88.1
  2081. 192.168.88.8
  2082. #192.168.88.9
  2083. #192.168.88.12
  2084. #192.168.88.14
  2085. 192.168.88.15
  2086. 192.168.88.16
  2087. 192.168.88.18
  2088.  
  2089. 6
  2090. What are three features of the TCP protocol? (Choose three.)
  2091. #It provides retransmission of data packets if they are lost during transmission.
  2092. It is a connectionless protocol.
  2093. #It uses a three-way handshake between the sending and receiving systems to establish each conversation.
  2094. #It specifies how messages are reassembled at the destination host.
  2095. It requires only 8 bytes of overhead.
  2096. It breaks the data packet into datagrams.
  2097.  
  2098. 7
  2099. Which combination of network address and subnet mask allows 62 hosts to be connected in a single subnet?
  2100. Network address 10.1.1.4 Subnet mask 255.255.255.240
  2101. Network address 10.1.1.0 Subnet mask 255.255.255.252
  2102. #Network address 10.1.1.0 Subnet mask 255.255.255.192
  2103. Network address 10.1.1.4 Subnet mask 255.255.255.248
  2104.  
  2105. 8
  2106. What occurs during a static NAT translation?
  2107. Multiple local addresses are mapped to one global address.
  2108. The host device is configured with a permanent outside global address.
  2109. #A one-to-one mapping is created between an inside local and outside global address.
  2110. The router is forced to return the inside global address to the address pool when a session ends.
  2111.  
  2112. 9
  2113. Refer to the exhibit. A network administrator is troubleshooting the serial connection between R1 and R2. There is no communication between R1 and R2. Based on the output of the show ip interface brief command, what is the cause of the problem?
  2114. #There is a misconfiguration of IP addresses.
  2115. There is a mismatch of encapsulation methods.
  2116. The no shutdown command should be issued on R2.
  2117. The routing protocols are not compatible.
  2118.  
  2119. 10
  2120. What is a feature of PAT?
  2121. It maps IP addresses to URLs.
  2122. It displays private IP addresses to public networks.
  2123. It sends acknowledgments of received packets.
  2124. #It allows multiple hosts on a single LAN to share globally unique IP addresses.
  2125.  
  2126. 11
  2127. Which protocol allows secure in-band management so that a network administrator can monitor and configure network devices without fear of any passwords being compromised?
  2128. #SSH
  2129. HTTP
  2130. SNMP
  2131. Telnet
  2132.  
  2133. 12
  2134. Refer to the exhibit. A PC has an IP address of 192.168.87.30 but is unable to contact a web server on the Internet. A network administrator is troubleshooting the DHCP configuration on a Cisco 1841 router. What is the possible error?
  2135. The IP address of the PC is outside the network range.
  2136. A domain name is required in the DHCP configuration.
  2137. The DHCP service has not been activated.
  2138. #The default-router command needs to be included in the DHCP configuration.
  2139. The DHCP pool has not been applied to an active interface.
  2140.  
  2141. 13
  2142. What is the maximum unrepeated distance set by industry standards for UTP cable?
  2143. 10 meters
  2144. 75 meters
  2145. #100 meters
  2146. 325 meters
  2147.  
  2148. 14
  2149. Refer to the exhibit. The network administrator uses the command below to configure a default route on RTB:
  2150.  
  2151. RTB(config)# ip route 0.0.0.0 0.0.0.0 fa0/0
  2152.  
  2153. A ping issued from PC3 is successful to RTB. However, echo request packets arrive at PC1 but the echo replies do not make it back to PC3. What will fix this problem?
  2154. RTA must be configured to forward packets to the 192.168.2.0 network.
  2155. #The ip route command needs to be edited so that the next hop address is 10.1.1.5.
  2156. The ip route command needs to be edited so that the 192.168.2.1 address is the next hop address.
  2157. The ip route command should be removed from the RTB router configuration.
  2158. Another default route should be configured on RTA with a next hop address of 10.1.1.6.
  2159.  
  2160. 15
  2161. Refer to the exhibit. What does the highlighted value 120 represent?
  2162. the number of hops between the router and network 10.0.5.0
  2163. #the administrative distance of the routing protocol
  2164. the UDP port number that is used for forwarding traffic
  2165. the bandwidth that is allocated to the serial interface
  2166.  
  2167. 16
  2168. Refer to the exhibit. What is the device named "Distribution"?
  2169. a firewall
  2170. a router
  2171. #a switch
  2172. an IP phone
  2173.  
  2174. 17
  2175. Refer to the exhibit. Router R1 has been configured with the commands that are displayed. Which fact can be determined from the configuration?
  2176. #All passwords are encrypted.
  2177. The privileged EXEC mode password is “password1.”
  2178. The router can support four Telnet sessions simultaneously.
  2179. The router can be accessed from the console without using any password.
  2180.  
  2181. 18
  2182. Refer to the exhibit. A NOC technician at an ISP enters the command c:\ping 209.165.201.7. What are two reasons to use this command? (Choose two.)
  2183. #map the path to 209.165.201.7
  2184. test reachability to 209.165.201.7
  2185. locate connectivity problems along the route to 209.165.201.7
  2186. identify ISPs that interconnect the NOC and remote host with IP 209.165.201.7
  2187. #measure the time that packets take to reach 209.165.201.7 and return to the technician's workstation
  2188.  
  2189. 19
  2190. Which statement describes a route that has been learned dynamically?
  2191. #It is automatically updated and maintained by routing protocols.
  2192. It is unaffected by changes in the topology of the network.
  2193. It has an administrative distance of 1.
  2194. It is identified by the prefix C in the routing table.
  2195.  
  2196. 20
  2197. Which cable should be used to connect a PC to the console port of a Cisco router?
  2198. serial
  2199. crossover
  2200. #rollover
  2201. straight-through
  2202.  
  2203. 21
  2204. Refer to the exhibit. Which combination of cable types should be used to complete the connection?
  2205. #Cable A - straight-through; Cable B - straight-through; Cable C - serial
  2206. Cable A - straight-through; Cable B - straight-through; Cable C - rollover
  2207. Cable A - rollover; Cable B - straight-through; Cable C - crossover
  2208. Cable A - straight-through; Cable B - crossover; Cable C - serial
  2209.  
  2210. 22
  2211. To manage a Cisco switch using Telnet, where would the management IP address be configured on the switch?
  2212. #VLAN 1 interface
  2213. first vty port
  2214. first trunk port
  2215. console port
  2216. FastEthernet 0/1 interface
  2217.  
  2218. 23
  2219. Refer to the exhibit. A user who is connected to RTA is trying to telnet to RTB, but the connection is failing. Based on the output of theshow running-config command on router RTB, why is the Telnet session failing?
  2220. Telnet has not been configured on the console line.
  2221. The login command has not been issued on the console line.
  2222. #No password has been configured on the VTY lines.
  2223. A session limit has not been configured for Telnet.
  2224.  
  2225. 24
  2226. Refer to the exhibit. R2 is connected to the Serial0/0/1 interface of R1 and is properly configured to share routing updates with R1. Which network will R2 exclude from installing in its routing table?
  2227. R 192.168.10.0/24 [120/2] via 192.168.1.2, 00:00:10, Serial0/0/1
  2228. R 192.168.7.0/24 [120/1] via 192.168.1.2, 00:00:10, Serial0/0/1
  2229. R 192.168.6.0/24 [120/15] via 192.168.3.2, 00:00:10, Serial0/0/0
  2230. R 192.168.8.0/24 [120/2] via 192.168.3.2, 00:00:10, Serial0/0/0
  2231.  
  2232. 25
  2233. If the configuration register is currently set to 0x2102, what is the first action that a router will take after the bootstrap program loads successfully?
  2234. #load the IOS from flash
  2235. load the IOS from NVRAM
  2236. load the IOS from the TFTP server
  2237. load the startup configuration file from flash
  2238. load the startup configuration file from NVRAM
  2239. load the startup configuration file from the TFTP server
  2240.  
  2241. 26
  2242. How does a switch interface that uses sticky port security handle MAC addresses?
  2243. The addresses are configured manually and are saved in the running configuration.
  2244. They are configured manually and are not saved in the running configuration.
  2245. #They are configured dynamically and are saved in the running configuration.
  2246. They are configured dynamically and are not saved in the running configuration.
  2247.  
  2248. 27
  2249. A network engineer is asked to specify the type of cable for a new network installation. The engineer plans horizontal cable runs of less than 90 feet (27.4 meters) using cable that is not expensive and is easy to implement. It will be positioned away from electrically noisy areas to avoid EMI. Which cable should the engineer choose?
  2250. STP
  2251. #UTP
  2252. coaxial
  2253. fiber optic
  2254.  
  2255. 28
  2256. A network is spread across two buildings that are separated by a distance of 500 feet (152 meters). An electrical transformer is installed near the cable route. Which type of cable should be used in this network?
  2257. STP
  2258. UTP
  2259. coaxial
  2260. #fiber-optic
  2261.  
  2262. 29
  2263. In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?
  2264. #destination network address
  2265. source network address
  2266. source MAC address
  2267. well known port destination address
  2268.  
  2269. 30
  2270. A network technician is using a network management station to gather data about the performance of devices and links within the ISP. Which application layer protocol makes this possible?
  2271. SNMP
  2272. FTP
  2273. DHCP
  2274. #SMTP
  2275.  
  2276. 31
  2277. How do port filtering and access lists help provide network security?
  2278. #They prevent specified types of traffic from reaching specified network destinations.
  2279. They alert network administrators to various type of denial of service attacks as they occur.
  2280. They prevent viruses, worms, and Trojans from infecting host computers and servers.
  2281. They enable encryption and authentication of confidential data communications.
  2282.  
  2283. 32
  2284. In the URL http://dev.cisco.com/wwwdocs/procedures.htm, what is identified by wwwdocs?
  2285. the server name where the resource is located
  2286. the protocol that is used for the resource request
  2287. the domain name of the server that is being accessed
  2288. #the folder where the requested resource is stored
  2289.  
  2290. 33
  2291. What are two purposes of DNS? (Choose two.)
  2292. to dynamically assign IP addressing information to network hosts
  2293. to simplify the administration of host and default gateway addressing on client computers
  2294. to assign TCP port numbers to hosts as part of the data transfer process
  2295. #to resolve human-readable domain names to numeric IP addresses
  2296. #to replace the static HOSTS file with a more practical dynamic system
  2297.  
  2298. 34
  2299. As a host prepares a message for communication, a header and trailer are added and the data is placed on the medium for transmission to the next directly connected device. At which two layers of the OSI model do these activities occur? (Choose two.)
  2300. session
  2301. network
  2302. #physical
  2303. transport
  2304. #data link
  2305. application
  2306. presentation
  2307.  
  2308. 35
  2309. Which two procedures are solutions if a duplex mismatch error is discovered on a switch port that is connected to a server NIC? (Choose two.)
  2310. Replace the NIC on the server.
  2311. Set the server NIC to half-duplex.
  2312. #Set the speed and duplex to match on both devices.
  2313. Power cycle both devices to reinitialize the autonegotiation process.
  2314. #Set both the switch port and the server NIC to autonegotiate speed and duplex.
  2315. Change the cable that connects the server and the switch to a crossover cable.
  2316.  
  2317. 36
  2318. Which protocol allows encryption of any application layer protocol?
  2319. FTP
  2320. FTPS
  2321. HTTPS
  2322. #IPsec
  2323. Telnet
  2324.  
  2325. 37
  2326. Which application can be delivered using UDP?
  2327. FTP
  2328. #DNS
  2329. HTTP
  2330. SMTP
  2331.  
  2332. 38
  2333. Refer to the exhibit. Which two statements describe the data conversation shown? (Choose two.)
  2334. #The data conversation was started by the HTTP application process running on the client.
  2335. The data conversation is identified by TCP port 80 on the client.
  2336. The user started the data conversation by sending an e-mail.
  2337. The IP address of the Internet server is 192.168.17.43.
  2338. #The Internet server will send data to port 8547 on the client.
  2339.  
  2340. 39
  2341. Which WAN service provides point-to-point connections with a predefined communications path?
  2342. E1
  2343. T1
  2344. dialup
  2345. #leased line
  2346.  
  2347. 40
  2348. Refer to the exhibit. The S0/0/0 interface of R2 is configured correctly with the default encapsulation. Which configuration should be implemented at the S0/0/0 interface of R1 to complete the connection between the two routers?
  2349. R1(config-if)# ip address 192.168.1.31 255.255.255.252
  2350. R1(config-if)# no shutdown
  2351. R1(config-if)# ip address 192.168.1.33 255.255.255.252
  2352. R1(config-if)# encapsulation PPP
  2353. R1(config-if)# no shutdown
  2354. R1(config-if)# ip address 192.168.1.28 255.255.255.252
  2355. R1(config-if)# encapsulation PPP
  2356. R1(config-if)# no shutdown
  2357. #R1(config-if)# ip address 192.168.1.29 255.255.255.252
  2358. #R1(config-if)# no shutdown
  2359.  
  2360. 41
  2361. When selecting a WAN service, a customer estimates that it may need about 20 Mb/s of the upstream bandwidth to support various server services on the Internet. Which WAN connection should the network designer recommend?
  2362. T1
  2363. DSL
  2364. ATM
  2365. Frame Relay
  2366. #fractional T3
  2367.  
  2368. 42
  2369. The command copy tftp running-config has been entered on the router. What will this command do?
  2370. copy the configuration in RAM to a server
  2371. #copy the configuration file from a server to RAM
  2372. copy the configuration file in NVRAM to RAM
  2373. copy the configuration file in NVRAM to a server
  2374. copy the configuration file from a server to NVRAM
  2375.  
  2376. 43
  2377. A company has formed a team that must analyze the probability of a disaster occurring and the associated effects and costs to their business. Which step of the disaster recovery plan is the team tasked with completing?
  2378. #risk assessment
  2379. vulnerability assessment
  2380. disaster scenario prioritization
  2381. disaster recovery strategy development
  2382.  
  2383. 44
  2384. Which statement correctly describes the function of AAA?
  2385. #It prevents unauthorized access to a network.
  2386. It filters traffic based on destination IP and port number.
  2387. It enables users to send information to a daemon that is running on a management station.
  2388. It encrypts data to provide network security.
  2389.  
  2390. 45
  2391. Which statement correctly describes the difference between HTTP and HTTPS?
  2392. The maximum number of simultaneous connections that a server can support for HTTPS is more than for HTTP.
  2393. HTTPS and HTTP use different client request-server response processes.
  2394. #HTTPS authenticates and encrypts the data being transferred between the client and the web server.
  2395. HTTPS specifies the rules for passing data between the physical layer and the data link layer.
  2396.  
  2397. 46
  2398. What routing protocol would be appropriate to use for exchanging routes between ISPs?
  2399. RIPv2
  2400. #BGP
  2401. OSPF
  2402. EIGRP
  2403.  
  2404. 47
  2405. A user reports being able to access the Internet but not being able to download e-mail from the mail server at the ISP. What should the user check on the user workstation?
  2406. #the POP3 and SMTP server settings in the e-mail application
  2407. the patch cable connections at the back of the workstation and at the wall plate
  2408. the DHCP settings in the operating system
  2409. the IP address, mask, and default gateway values
  2410. the NIC drivers
  2411.  
  2412. 48
  2413. What is the primary function of a Level 1 support technician in an ISP help desk department with multiple levels of customer support?
  2414. to install hardware replacements for the customer
  2415. to accompany an on-site technician to provide additional technical support
  2416. #to diagnose and document the symptoms of hardware, software, and system problems
  2417. to design network enhancements that support the new technology requirements of the customer
  2418.  
  2419. 49
  2420. A user reports being unable to access the Internet. The help desk technician employs a bottom-up approach to troubleshooting. The technician first has the user check the patch cable connection from the PC to the wall, and then has the user verify that the NIC has a green link light. What will the technician have the user do next?
  2421. Enter an IP address into the WWW browser address bar to see if DNS is at fault.
  2422. Use traceroute to identify the device along the path to the ISP that may be at fault.
  2423. #Verify the IP address, subnet, and gateway settings using ipconfig on the PC.
  2424. Connect to the user home router to check firewall settings for blocked TCP ports.
  2425.  
  2426. 51
  2427. A customer reports connectivity problems to an ISP technician. Upon questioning the customer, the technician discovers that all network applications are functioning except for FTP. What should the technician suspect is the problem?
  2428. #misconfigured firewall
  2429. bad port on switch or hub
  2430. misconfigured IP addressing on the customer's workstation
  2431. wrong DNS server configured on the customer's workstation
  2432. wrong default gateway configured on the customer's workstation
  2433.  
  2434. 52
  2435. What is used by a routing protocol to determine the best path to include in the routing table?
  2436. Convergence time
  2437. Default distance
  2438. #Metric
  2439. Type of router
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement